Sciweavers

418 search results - page 21 / 84
» Security Associations in Personal Networks: A Comparative An...
Sort
View
WS
2005
ACM
14 years 1 months ago
Fully self-organized peer-to-peer key management for mobile ad hoc networks
Mobile ad hoc networks (MANETs) offer communication over a shared wireless channel without any pre-existing infrastructure. Forming peer-to-peer security associations in MANETs i...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
CSFW
2007
IEEE
14 years 2 months ago
Reasoning about Concurrency for Security Tunnels
There has been excellent progress on languages for rigorously describing key exchange protocols and techniques for proving that the network security tunnels they establish preserv...
Alwyn Goodloe, Carl A. Gunter
BMCBI
2008
143views more  BMCBI 2008»
13 years 8 months ago
catmap: Case-control And TDT Meta-Analysis Package
Background: Risk for complex disease is thought to be controlled by multiple genetic risk factors, each with small individual effects. Meta-analyses of several independent studies...
Kristin K. Nicodemus
SASN
2003
ACM
14 years 1 months ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
AGENTS
2001
Springer
14 years 12 days ago
Intelligent agents for an artificial market system
This paper describes an agent-based artificial market system whose underlying interaction protocols provide advanced features. Using the system, actors (i.e., customers and mercha...
Nikos I. Karacapilidis, Pavlos Moraitis